dblp.uni-trier.dewww.uni-trier.de

Kui Ren

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
28EEZhiguo Wan, Kui Ren, Bo Zhu, Bart Preneel, Ming Gu: Anonymous user communication for privacy protection in wireless metropolitan mesh networks. ASIACCS 2009: 368-371
27EEJiqiang Lv, Kui Ren, Xiaofeng Chen, Kwangjo Kim: The ring authenticated encryption scheme - How to provide a clue wisely. Inf. Sci. 179(1-2): 161-168 (2009)
2008
26EEKai Zeng, Shucheng Yu, Kui Ren, Wenjing Lou, Yanchao Zhang: Towards Secure Link Quality Measurement in Multihop Wireless Networks. GLOBECOM 2008: 4946-4950
25EEYong Hao, Yu Cheng, Kui Ren: Distributed Key Management with Protection Against RSU Compromise in Group Signature Based VANETs. GLOBECOM 2008: 4951-4955
24EEQian Wang, Kui Ren: Time-Slotted Round-Trip Carrier Synchronization in Large-Scale Wireless Networks. ICC 2008: 5087-5091
23EEXiaohua Tian, Yu Cheng, Kui Ren, Bin Liu: Multicast with an Application-Oriented Networking (AON) Approach. ICC 2008: 5646-5651
22EEKui Ren, Wenjing Lou: A Sophisticated Privacy-Enhanced Yet Accountable Security Framework for Metropolitan Wireless Mesh Networks. ICDCS 2008: 286-294
21EEBo Zhu, Kui Ren, Lingyu Wang: Anonymous Misbehavior Detection in Mobile Ad Hoc Networks. ICDCS Workshops 2008: 358-363
20EEWei Ren, Kui Ren, Wenjing Lou: Optimized User Revocation for Group Signature Based Privacy-Aware PKI. ICDCS Workshops 2008: 388-393
19EEQian Wang, Kui Ren, Yanchao Zhang, Bo Zhu: Opportunistic Cooperation with Receiver-Based Ratio Combining Strategy. WASA 2008: 361-372
18EEZhiguo Wan, Kui Ren, Wenjing Lou, Bart Preneel: Anonymous ID-Based Group Key Agreement for Wireless Networks. WCNC 2008: 2615-2620
17EEZhiguo Wan, Kui Ren, Bart Preneel: A secure privacy-preserving roaming protocol based on hierarchical identity-based encryption for mobile networks. WISEC 2008: 62-67
16EEKui Ren, Wenjing Lou, Yanchao Zhang: LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks. IEEE Trans. Mob. Comput. 7(5): 585-598 (2008)
15EEKui Ren, Kai Zeng, Wenjing Lou: Secure and Fault-Tolerant Event Boundary Detection in Wireless Sensor Networks. IEEE Transactions on Wireless Communications 7(1): 354-363 (2008)
14EEGuillaume Bal, Kui Ren: Transport-Based Imaging in Random Media. SIAM Journal of Applied Mathematics 68(6): 1738-1762 (2008)
2007
13EEKui Ren, Wenjing Lou, Yanchao Zhang: Multi-user Broadcast Authentication in Wireless Sensor Networks. SECON 2007: 223-232
12EEKui Ren, Wenjing Lou, Kai Zeng, Patrick J. Moran: On Broadcast Authentication in Wireless Sensor Networks. IEEE Transactions on Wireless Communications 6(11): 4136-4144 (2007)
11EEKui Ren, Wenjing Lou: Privacy-enhanced, Attack-resilient Access Control in Pervasive Computing Environments with Optional Context Authentication Capability. MONET 12(1): 79-92 (2007)
2006
10EEKui Ren, Kai Zeng, Wenjing Lou: Fault-tolerant Event Boundary Detection in Wireless Sensor Networks. GLOBECOM 2006
9EEKui Ren, Wenjing Lou, Yanchao Zhang: LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks. INFOCOM 2006
8EEKui Ren, Kai Zeng, Wenjing Lou, Patrick J. Moran: On Broadcast Authentication in Wireless Sensor Networks. WASA 2006: 502-514
7EEKui Ren, Wenjing Lou, Kai Zeng, Feng Bao, Jianying Zhou, Robert H. Deng: Routing optimization security in mobile IPv6. Computer Networks 50(13): 2401-2419 (2006)
6EEKui Ren, Guillaume Bal, Andreas H. Hielscher: Frequency Domain Optical Tomography Based on the Equation of Radiative Transfer. SIAM J. Scientific Computing 28(4): 1463-1489 (2006)
5EEKui Ren, Kai Zeng, Wenjing Lou: A new approach for random key pre-distribution in large-scale wireless sensor networks. Wireless Communications and Mobile Computing 6: 307-318 (2006)
2005
4 Kui Ren, Wenjing Lou: Privacy enhanced access control in pervasive computing environments. BROADNETS 2005: 384-396
2004
3EEKui Ren, Hyunrok Lee, Kwangjo Kim, Taewhan Yoo: Efficient Authenticated Key Agreement Protocol for Dynamic Groups. WISA 2004: 144-159
2EEKui Ren, Tieyan Li, Zhiguo Wan, Feng Bao, Robert H. Deng, Kwangjo Kim: Highly reliable trust establishment scheme in ad hoc networks. Computer Networks 45(6): 687-699 (2004)
2003
1EEGang Yao, Kui Ren, Feng Bao, Robert H. Deng, Dengguo Feng: Making the Key Agreement Protocol in Mobile ad hoc Network More Efficient. ACNS 2003: 343-356

Coauthor Index

1Guillaume Bal [6] [14]
2Feng Bao [1] [2] [7]
3Xiaofeng Chen [27]
4Yu Cheng [23] [25]
5Robert H. Deng (Robert Huijie Deng) [1] [2] [7]
6Dengguo Feng [1]
7Ming Gu [28]
8Yong Hao [25]
9Andreas H. Hielscher [6]
10Kwangjo Kim [2] [3] [27]
11Hyunrok Lee [3]
12Tieyan Li [2]
13Bin Liu [23]
14Wenjing Lou [4] [5] [7] [8] [9] [10] [11] [12] [13] [15] [16] [18] [20] [22] [26]
15Jiqiang Lu (Jiqiang Lv) [27]
16Patrick J. Moran [8] [12]
17Bart Preneel [17] [18] [28]
18Wei Ren [20]
19Xiaohua Tian [23]
20Zhiguo Wan [2] [17] [18] [28]
21Lingyu Wang [21]
22Qian Wang [19] [24]
23Gang Yao [1]
24Taewhan Yoo [3]
25Shucheng Yu [26]
26Kai Zeng [5] [7] [8] [10] [12] [15] [26]
27Yanchao Zhang [9] [13] [16] [19] [26]
28Jianying Zhou [7]
29Bo Zhu [19] [21] [28]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)