Search the dblp DataBase
Sencun Zhu :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Sencun Zhu , Chao Yao , Donggang Liu , Sanjeev Setia , Sushil Jajodia Efficient Security Mechanisms for Overlay Multicast-Based Content Distribution. [Citation Graph (0, 0)][DBLP ] ACNS, 2005, pp:40-55 [Conf ] Sencun Zhu , Sanjeev Setia , Sushil Jajodia LEAP: efficient security mechanisms for large-scale distributed sensor networks. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2003, pp:62-72 [Conf ] Yingjiu Li , Sencun Zhu , Lingyu Wang , Sushil Jajodia A Privacy-Enhanced Microaggregation Method. [Citation Graph (0, 0)][DBLP ] FoIKS, 2002, pp:148-159 [Conf ] Sencun Zhu , Sanjeev Setia , Sushil Jajodia Performance Optimizations for Group Key Management Scheme. [Citation Graph (0, 0)][DBLP ] ICDCS, 2003, pp:163-0 [Conf ] Sencun Zhu , Shouhuai Xu , Sanjeev Setia , Sushil Jajodia LHAP: A Lightweight Hop-by-Hop Authentication Protocol for Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP ] ICDCS Workshops, 2003, pp:749-0 [Conf ] Sencun Zhu , Shouhuai Xu , Sanjeev Setia , Sushil Jajodia Establishing Pairwise Keys for Secure Communication in Ad Hoc Networks: A Probabilistic Approach. [Citation Graph (0, 0)][DBLP ] ICNP, 2003, pp:326-335 [Conf ] Sencun Zhu , Sushil Jajodia Scalable Group Rekeying for Secure Multicast: A Survey. [Citation Graph (0, 0)][DBLP ] IWDC, 2003, pp:1-10 [Conf ] Wensheng Zhang , Hui Song , Sencun Zhu , Guohong Cao Least privilege and privilege deprivation: towards tolerating mobile sink compromises in wireless sensor networks. [Citation Graph (0, 0)][DBLP ] MobiHoc, 2005, pp:378-389 [Conf ] Yi Yang , Xinran Wang , Sencun Zhu , Guohong Cao SDAP: : a secure hop-by-Hop data aggregation protocol for sensor networks. [Citation Graph (0, 0)][DBLP ] MobiHoc, 2006, pp:356-367 [Conf ] Sencun Zhu , Sanjeev Setia , Shouhuai Xu , Sushil Jajodia GKMPAN: An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP ] MobiQuitous, 2004, pp:42-51 [Conf ] Donggang Liu , Peng Ning , Sencun Zhu , Sushil Jajodia Practical Broadcast Authentication in Sensor Networks. [Citation Graph (0, 0)][DBLP ] MobiQuitous, 2005, pp:118-132 [Conf ] Sencun Zhu , Sanjeev Setia , Sushil Jajodia Adding Reliable and Self-healing Key Distribution to the Subset Difference Group Rekeying Method for Secure Multicast. [Citation Graph (0, 0)][DBLP ] Networked Group Communication, 2003, pp:107-118 [Conf ] Sencun Zhu , Sanjeev Setia , Sushil Jajodia LEAP - efficient security mechanisms for large-scale distributed sensor networks. [Citation Graph (0, 0)][DBLP ] SenSys, 2003, pp:308-309 [Conf ] Sencun Zhu , Sanjeev Setia , Sushil Jajodia , Peng Ning An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2004, pp:259-271 [Conf ] Hui Song , Sencun Zhu , Guohong Cao Attack-resilient time synchronization for wireless sensor networks. [Citation Graph (0, 0)][DBLP ] Ad Hoc Networks, 2007, v:5, n:1, pp:112-125 [Journal ] Sencun Zhu , Shouhuai Xu , Sanjeev Setia , Sushil Jajodia LHAP: A lightweight network access control protocol for ad hoc networks. [Citation Graph (0, 0)][DBLP ] Ad Hoc Networks, 2006, v:4, n:5, pp:567-585 [Journal ] Yingjiu Li , Sencun Zhu , Xiaoyang Sean Wang , Sushil Jajodia Looking into the seeds of time: Discovering temporal patterns in large transaction sets. [Citation Graph (0, 0)][DBLP ] Inf. Sci., 2006, v:176, n:8, pp:1003-1031 [Journal ] Sencun Zhu , Sanjeev Setia , Shouhuai Xu , Sushil Jajodia GKMPAN: An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 2006, v:14, n:4, pp:301-325 [Journal ] Sanjeev Setia , Sencun Zhu , Sushil Jajodia A comparative performance analysis of reliable group rekey transport protocols for secure multicast. [Citation Graph (0, 0)][DBLP ] Perform. Eval., 2002, v:49, n:1/4, pp:21-41 [Journal ] Sencun Zhu , Sanjeev Setia , Sushil Jajodia LEAP+: Efficient security mechanisms for large-scale distributed sensor networks. [Citation Graph (0, 0)][DBLP ] TOSN, 2006, v:2, n:4, pp:500-528 [Journal ] Min Shao , Sencun Zhu , Wensheng Zhang , Guohong Cao pDCS: Security and Privacy Support for Data-Centric Sensor Networks. [Citation Graph (0, 0)][DBLP ] INFOCOM, 2007, pp:1298-1306 [Conf ] Patrick Traynor , Heesook Choi , Guohong Cao , Sencun Zhu , Tom La Porta Establishing Pair-Wise Keys in Heterogeneous Sensor Networks. [Citation Graph (0, 0)][DBLP ] INFOCOM, 2006, pp:- [Conf ] Hui Song , Liang Xie , Sencun Zhu , Guohong Cao Sensor node compromise detection: the location perspective. [Citation Graph (0, 0)][DBLP ] IWCMC, 2007, pp:242-247 [Conf ] Sencun Zhu , Chao Yao , Donggang Liu , Sanjeev Setia , Sushil Jajodia Efficient security mechanisms for overlay multicast based content delivery. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2007, v:30, n:4, pp:793-806 [Journal ] Patrick Traynor , Raju Kumar , Heesook Choi , Guohong Cao , Sencun Zhu , Thomas F. La Porta Efficient Hybrid Security Mechanisms for Heterogeneous Sensor Networks. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Mob. Comput., 2007, v:6, n:6, pp:663-677 [Journal ] Sencun Zhu , Sanjeev Setia , Sushil Jajodia , Peng Ning Interleaved hop-by-hop authentication against false data injection attacks in sensor networks. [Citation Graph (0, 0)][DBLP ] TOSN, 2007, v:3, n:3, pp:- [Journal ] On the Effectiveness of Internal Patching Against File-Sharing Worms. [Citation Graph (, )][DBLP ] COP: A Step toward Children Online Privacy. [Citation Graph (, )][DBLP ] STILL: Exploit Code Detection via Static Taint and Initialization Analyses. [Citation Graph (, )][DBLP ] Detecting Software Theft via System Call Based Birthmarks. [Citation Graph (, )][DBLP ] Behavior based software theft detection. [Citation Graph (, )][DBLP ] A hotspot-based protocol for attack traceback in mobile ad hoc networks. [Citation Graph (, )][DBLP ] Detecting Remote Exploits Using Data Mining. [Citation Graph (, )][DBLP ] Towards Statistically Strong Source Anonymity for Sensor Networks. [Citation Graph (, )][DBLP ] SVATS: A Sensor-Network-Based Vehicle Anti-Theft System. [Citation Graph (, )][DBLP ] A Chain Reaction DoS Attack on 3G Networks: Analysis and Defenses. [Citation Graph (, )][DBLP ] A Social Network Based Patching Scheme for Worm Containment in Cellular Networks. [Citation Graph (, )][DBLP ] Routing in Socially Selfish Delay Tolerant Networks. [Citation Graph (, )][DBLP ] Improving sensor network immunity under worm attacks: a software diversity approach. [Citation Graph (, )][DBLP ] A random perturbation-based scheme for pairwise key establishment in sensor networks. [Citation Graph (, )][DBLP ] A Feasibility Study on Defending Against Ultra-Fast TopologicalWorms. [Citation Graph (, )][DBLP ] Distributed Software-based Attestation for Node Compromise Detection in Sensor Networks. [Citation Graph (, )][DBLP ] Protecting web services from remote exploit code: a static analysis approach. [Citation Graph (, )][DBLP ] A systematic approach for cell-phone worm containment. [Citation Graph (, )][DBLP ] pBMDS: a behavior-based malware detection system for cellphone devices. [Citation Graph (, )][DBLP ] Towards event source unobservability with minimum network traffic in sensor networks. [Citation Graph (, )][DBLP ] Editorial for special issue on privacy and security in wireless sensorand ad hoc networks. [Citation Graph (, )][DBLP ] Predistribution and local collaboration-based group rekeying for wireless sensor networks. [Citation Graph (, )][DBLP ] Search in 0.004secs, Finished in 0.006secs