The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Sencun Zhu: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Sencun Zhu, Chao Yao, Donggang Liu, Sanjeev Setia, Sushil Jajodia
    Efficient Security Mechanisms for Overlay Multicast-Based Content Distribution. [Citation Graph (0, 0)][DBLP]
    ACNS, 2005, pp:40-55 [Conf]
  2. Sencun Zhu, Sanjeev Setia, Sushil Jajodia
    LEAP: efficient security mechanisms for large-scale distributed sensor networks. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2003, pp:62-72 [Conf]
  3. Yingjiu Li, Sencun Zhu, Lingyu Wang, Sushil Jajodia
    A Privacy-Enhanced Microaggregation Method. [Citation Graph (0, 0)][DBLP]
    FoIKS, 2002, pp:148-159 [Conf]
  4. Sencun Zhu, Sanjeev Setia, Sushil Jajodia
    Performance Optimizations for Group Key Management Scheme. [Citation Graph (0, 0)][DBLP]
    ICDCS, 2003, pp:163-0 [Conf]
  5. Sencun Zhu, Shouhuai Xu, Sanjeev Setia, Sushil Jajodia
    LHAP: A Lightweight Hop-by-Hop Authentication Protocol for Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ICDCS Workshops, 2003, pp:749-0 [Conf]
  6. Sencun Zhu, Shouhuai Xu, Sanjeev Setia, Sushil Jajodia
    Establishing Pairwise Keys for Secure Communication in Ad Hoc Networks: A Probabilistic Approach. [Citation Graph (0, 0)][DBLP]
    ICNP, 2003, pp:326-335 [Conf]
  7. Sencun Zhu, Sushil Jajodia
    Scalable Group Rekeying for Secure Multicast: A Survey. [Citation Graph (0, 0)][DBLP]
    IWDC, 2003, pp:1-10 [Conf]
  8. Wensheng Zhang, Hui Song, Sencun Zhu, Guohong Cao
    Least privilege and privilege deprivation: towards tolerating mobile sink compromises in wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    MobiHoc, 2005, pp:378-389 [Conf]
  9. Yi Yang, Xinran Wang, Sencun Zhu, Guohong Cao
    SDAP: : a secure hop-by-Hop data aggregation protocol for sensor networks. [Citation Graph (0, 0)][DBLP]
    MobiHoc, 2006, pp:356-367 [Conf]
  10. Sencun Zhu, Sanjeev Setia, Shouhuai Xu, Sushil Jajodia
    GKMPAN: An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP]
    MobiQuitous, 2004, pp:42-51 [Conf]
  11. Donggang Liu, Peng Ning, Sencun Zhu, Sushil Jajodia
    Practical Broadcast Authentication in Sensor Networks. [Citation Graph (0, 0)][DBLP]
    MobiQuitous, 2005, pp:118-132 [Conf]
  12. Sencun Zhu, Sanjeev Setia, Sushil Jajodia
    Adding Reliable and Self-healing Key Distribution to the Subset Difference Group Rekeying Method for Secure Multicast. [Citation Graph (0, 0)][DBLP]
    Networked Group Communication, 2003, pp:107-118 [Conf]
  13. Sencun Zhu, Sanjeev Setia, Sushil Jajodia
    LEAP - efficient security mechanisms for large-scale distributed sensor networks. [Citation Graph (0, 0)][DBLP]
    SenSys, 2003, pp:308-309 [Conf]
  14. Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng Ning
    An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2004, pp:259-271 [Conf]
  15. Hui Song, Sencun Zhu, Guohong Cao
    Attack-resilient time synchronization for wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    Ad Hoc Networks, 2007, v:5, n:1, pp:112-125 [Journal]
  16. Sencun Zhu, Shouhuai Xu, Sanjeev Setia, Sushil Jajodia
    LHAP: A lightweight network access control protocol for ad hoc networks. [Citation Graph (0, 0)][DBLP]
    Ad Hoc Networks, 2006, v:4, n:5, pp:567-585 [Journal]
  17. Yingjiu Li, Sencun Zhu, Xiaoyang Sean Wang, Sushil Jajodia
    Looking into the seeds of time: Discovering temporal patterns in large transaction sets. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 2006, v:176, n:8, pp:1003-1031 [Journal]
  18. Sencun Zhu, Sanjeev Setia, Shouhuai Xu, Sushil Jajodia
    GKMPAN: An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2006, v:14, n:4, pp:301-325 [Journal]
  19. Sanjeev Setia, Sencun Zhu, Sushil Jajodia
    A comparative performance analysis of reliable group rekey transport protocols for secure multicast. [Citation Graph (0, 0)][DBLP]
    Perform. Eval., 2002, v:49, n:1/4, pp:21-41 [Journal]
  20. Sencun Zhu, Sanjeev Setia, Sushil Jajodia
    LEAP+: Efficient security mechanisms for large-scale distributed sensor networks. [Citation Graph (0, 0)][DBLP]
    TOSN, 2006, v:2, n:4, pp:500-528 [Journal]
  21. Min Shao, Sencun Zhu, Wensheng Zhang, Guohong Cao
    pDCS: Security and Privacy Support for Data-Centric Sensor Networks. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2007, pp:1298-1306 [Conf]
  22. Patrick Traynor, Heesook Choi, Guohong Cao, Sencun Zhu, Tom La Porta
    Establishing Pair-Wise Keys in Heterogeneous Sensor Networks. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2006, pp:- [Conf]
  23. Hui Song, Liang Xie, Sencun Zhu, Guohong Cao
    Sensor node compromise detection: the location perspective. [Citation Graph (0, 0)][DBLP]
    IWCMC, 2007, pp:242-247 [Conf]
  24. Sencun Zhu, Chao Yao, Donggang Liu, Sanjeev Setia, Sushil Jajodia
    Efficient security mechanisms for overlay multicast based content delivery. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2007, v:30, n:4, pp:793-806 [Journal]
  25. Patrick Traynor, Raju Kumar, Heesook Choi, Guohong Cao, Sencun Zhu, Thomas F. La Porta
    Efficient Hybrid Security Mechanisms for Heterogeneous Sensor Networks. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Mob. Comput., 2007, v:6, n:6, pp:663-677 [Journal]
  26. Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng Ning
    Interleaved hop-by-hop authentication against false data injection attacks in sensor networks. [Citation Graph (0, 0)][DBLP]
    TOSN, 2007, v:3, n:3, pp:- [Journal]

  27. On the Effectiveness of Internal Patching Against File-Sharing Worms. [Citation Graph (, )][DBLP]


  28. COP: A Step toward Children Online Privacy. [Citation Graph (, )][DBLP]


  29. STILL: Exploit Code Detection via Static Taint and Initialization Analyses. [Citation Graph (, )][DBLP]


  30. Detecting Software Theft via System Call Based Birthmarks. [Citation Graph (, )][DBLP]


  31. Behavior based software theft detection. [Citation Graph (, )][DBLP]


  32. A hotspot-based protocol for attack traceback in mobile ad hoc networks. [Citation Graph (, )][DBLP]


  33. Detecting Remote Exploits Using Data Mining. [Citation Graph (, )][DBLP]


  34. Towards Statistically Strong Source Anonymity for Sensor Networks. [Citation Graph (, )][DBLP]


  35. SVATS: A Sensor-Network-Based Vehicle Anti-Theft System. [Citation Graph (, )][DBLP]


  36. A Chain Reaction DoS Attack on 3G Networks: Analysis and Defenses. [Citation Graph (, )][DBLP]


  37. A Social Network Based Patching Scheme for Worm Containment in Cellular Networks. [Citation Graph (, )][DBLP]


  38. Routing in Socially Selfish Delay Tolerant Networks. [Citation Graph (, )][DBLP]


  39. Improving sensor network immunity under worm attacks: a software diversity approach. [Citation Graph (, )][DBLP]


  40. A random perturbation-based scheme for pairwise key establishment in sensor networks. [Citation Graph (, )][DBLP]


  41. A Feasibility Study on Defending Against Ultra-Fast TopologicalWorms. [Citation Graph (, )][DBLP]


  42. Distributed Software-based Attestation for Node Compromise Detection in Sensor Networks. [Citation Graph (, )][DBLP]


  43. Protecting web services from remote exploit code: a static analysis approach. [Citation Graph (, )][DBLP]


  44. A systematic approach for cell-phone worm containment. [Citation Graph (, )][DBLP]


  45. pBMDS: a behavior-based malware detection system for cellphone devices. [Citation Graph (, )][DBLP]


  46. Towards event source unobservability with minimum network traffic in sensor networks. [Citation Graph (, )][DBLP]


  47. Editorial for special issue on privacy and security in wireless sensorand ad hoc networks. [Citation Graph (, )][DBLP]


  48. Predistribution and local collaboration-based group rekeying for wireless sensor networks. [Citation Graph (, )][DBLP]


Search in 0.359secs, Finished in 0.361secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002