The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Donggang Liu: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Sencun Zhu, Chao Yao, Donggang Liu, Sanjeev Setia, Sushil Jajodia
    Efficient Security Mechanisms for Overlay Multicast-Based Content Distribution. [Citation Graph (0, 0)][DBLP]
    ACNS, 2005, pp:40-55 [Conf]
  2. Donggang Liu, Peng Ning
    Establishing pairwise keys in distributed sensor networks. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2003, pp:52-61 [Conf]
  3. Donggang Liu, Peng Ning, Kun Sun
    Efficient self-healing group key distribution with revocation capability. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2003, pp:231-240 [Conf]
  4. Donggang Liu, Peng Ning, Wenliang Du
    Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ICDCS, 2005, pp:609-619 [Conf]
  5. Donggang Liu, Peng Ning, Wenliang Du
    Attack-resistant location estimation in sensor networks. [Citation Graph (0, 0)][DBLP]
    IPSN, 2005, pp:99-106 [Conf]
  6. Donggang Liu, Peng Ning, Sencun Zhu, Sushil Jajodia
    Practical Broadcast Authentication in Sensor Networks. [Citation Graph (0, 0)][DBLP]
    MobiQuitous, 2005, pp:118-132 [Conf]
  7. Donggang Liu, Peng Ning
    Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks. [Citation Graph (0, 0)][DBLP]
    NDSS, 2003, pp:- [Conf]
  8. Donggang Liu, Peng Ning
    Location-based pairwise key establishments for static sensor networks. [Citation Graph (0, 0)][DBLP]
    SASN, 2003, pp:72-82 [Conf]
  9. Donggang Liu, Peng Ning
    Multilevel µTESLA: Broadcast authentication for distributed sensor networks. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Embedded Comput. Syst., 2004, v:3, n:4, pp:800-836 [Journal]
  10. Donggang Liu, Peng Ning, Rongfang Li
    Establishing pairwise keys in distributed sensor networks. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2005, v:8, n:1, pp:41-77 [Journal]
  11. Donggang Liu, Peng Ning
    Improving key predistribution with deployment knowledge in static sensor networks. [Citation Graph (0, 0)][DBLP]
    TOSN, 2005, v:1, n:2, pp:204-239 [Journal]
  12. Donggang Liu
    Efficient and Distributed Access Control for Sensor Networks. [Citation Graph (0, 0)][DBLP]
    DCOSS, 2007, pp:21-35 [Conf]
  13. Donggang Liu
    Resilient Cluster Formation for Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ICDCS, 2007, pp:40- [Conf]
  14. Sencun Zhu, Chao Yao, Donggang Liu, Sanjeev Setia, Sushil Jajodia
    Efficient security mechanisms for overlay multicast based content delivery. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2007, v:30, n:4, pp:793-806 [Journal]

  15. Protecting Neighbor Discovery Against Node Compromises in Sensor Networks. [Citation Graph (, )][DBLP]


  16. Adaptive Jamming-Resistant Broadcast Systems with Partial Channel Sharing. [Citation Graph (, )][DBLP]


  17. Location Privacy in Sensor Networks Against a Global Eavesdropper. [Citation Graph (, )][DBLP]


  18. Combating side-channel attacks using key management. [Citation Graph (, )][DBLP]


  19. Reusing Existing Test Cases for Security Testing. [Citation Graph (, )][DBLP]


  20. Using Auxiliary Sensors for Pairwise Key Establishment in WSN. [Citation Graph (, )][DBLP]


  21. Distributed Detection of Replicas with Deployment Knowledge in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  22. Group-based key pre-distribution in wireless sensor networks. [Citation Graph (, )][DBLP]


  23. Detecting Misused Keys in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  24. Pre-authentication filters: providing dos resistance for signature-based broadcast authentication in sensor networks. [Citation Graph (, )][DBLP]


  25. Distributed detection of replica node attacks with group deployment knowledge in wireless sensor networks. [Citation Graph (, )][DBLP]


Search in 0.018secs, Finished in 0.020secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002