| 2009 |
| 12 | EE | Haodong Wang,
Bo Sheng,
Qun Li:
Privacy-aware routing in sensor networks.
Computer Networks 53(9): 1512-1529 (2009) |
| 2008 |
| 11 | EE | Haodong Wang,
Bo Sheng,
Chiu Chiang Tan,
Qun Li:
Comparing Symmetric-key and Public-key Based Security Schemes in Sensor Networks: A Case Study of User Access Control.
ICDCS 2008: 11-18 |
| 10 | EE | Chiu Chiang Tan,
Bo Sheng,
Qun Li:
How to Monitor for Missing RFID tags.
ICDCS 2008: 295-302 |
| 9 | EE | Bo Sheng,
Qun Li:
Verifiable Privacy-Preserving Range Query in Two-Tiered Sensor Networks.
INFOCOM 2008: 46-50 |
| 8 | EE | Bo Sheng,
Chiu Chiang Tan,
Qun Li,
Weizhen Mao:
Finding popular categories for RFID tags.
MobiHoc 2008: 159-168 |
| 7 | EE | Chiu Chiang Tan,
Bo Sheng,
Haodong Wang,
Qun Li:
Microsearch: When Search Engines Meet Small Devices.
Pervasive 2008: 93-110 |
| 6 | EE | Chiu Chiang Tan,
Bo Sheng,
Qun Li:
Secure and Serverless RFID Authentication and Search Protocols.
IEEE Transactions on Wireless Communications 7(4): 1400-1407 (2008) |
| 2007 |
| 5 | EE | Bo Sheng,
Qun Li,
Weizhen Mao,
Wen Jin:
Outlier detection in sensor networks.
MobiHoc 2007: 219-228 |
| 4 | EE | Chiu Chiang Tan,
Bo Sheng,
Qun Li:
Severless Search and Authentication Protocols for RFID.
PerCom 2007: 3-12 |
| 2006 |
| 3 | EE | Bo Sheng,
Qun Li,
Weizhen Mao:
Data storage placement in sensor networks.
MobiHoc 2006: 344-355 |
| 2 | EE | Haodong Wang,
Bo Sheng,
Qun Li:
Elliptic curve cryptography-based access control in sensor networks.
IJSN 1(3/4): 127-137 (2006) |
| 2004 |
| 1 | EE | Bo Sheng,
Farokh B. Bastani:
Secure and Reliable Decentralized Peer-to-Peer Web Cache.
IPDPS 2004 |