2009 |
12 | EE | Haodong Wang,
Bo Sheng,
Qun Li:
Privacy-aware routing in sensor networks.
Computer Networks 53(9): 1512-1529 (2009) |
2008 |
11 | EE | Haodong Wang,
Bo Sheng,
Chiu Chiang Tan,
Qun Li:
Comparing Symmetric-key and Public-key Based Security Schemes in Sensor Networks: A Case Study of User Access Control.
ICDCS 2008: 11-18 |
10 | EE | Chiu Chiang Tan,
Bo Sheng,
Qun Li:
How to Monitor for Missing RFID tags.
ICDCS 2008: 295-302 |
9 | EE | Bo Sheng,
Qun Li:
Verifiable Privacy-Preserving Range Query in Two-Tiered Sensor Networks.
INFOCOM 2008: 46-50 |
8 | EE | Bo Sheng,
Chiu Chiang Tan,
Qun Li,
Weizhen Mao:
Finding popular categories for RFID tags.
MobiHoc 2008: 159-168 |
7 | EE | Chiu Chiang Tan,
Bo Sheng,
Haodong Wang,
Qun Li:
Microsearch: When Search Engines Meet Small Devices.
Pervasive 2008: 93-110 |
6 | EE | Chiu Chiang Tan,
Bo Sheng,
Qun Li:
Secure and Serverless RFID Authentication and Search Protocols.
IEEE Transactions on Wireless Communications 7(4): 1400-1407 (2008) |
2007 |
5 | EE | Bo Sheng,
Qun Li,
Weizhen Mao,
Wen Jin:
Outlier detection in sensor networks.
MobiHoc 2007: 219-228 |
4 | EE | Chiu Chiang Tan,
Bo Sheng,
Qun Li:
Severless Search and Authentication Protocols for RFID.
PerCom 2007: 3-12 |
2006 |
3 | EE | Bo Sheng,
Qun Li,
Weizhen Mao:
Data storage placement in sensor networks.
MobiHoc 2006: 344-355 |
2 | EE | Haodong Wang,
Bo Sheng,
Qun Li:
Elliptic curve cryptography-based access control in sensor networks.
IJSN 1(3/4): 127-137 (2006) |
2004 |
1 | EE | Bo Sheng,
Farokh B. Bastani:
Secure and Reliable Decentralized Peer-to-Peer Web Cache.
IPDPS 2004 |