The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Yih-Chun Hu: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Yih-Chun Hu, Markus Jakobsson, Adrian Perrig
    Efficient Constructions for One-Way Hash Chains. [Citation Graph (0, 0)][DBLP]
    ACNS, 2005, pp:423-441 [Conf]
  2. Yih-Chun Hu, David B. Johnson
    Exploiting Congestion Information in Network and Higher Layer Protocols in Multihop Wireless Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ICDCS, 2004, pp:301-310 [Conf]
  3. Yih-Chun Hu, Adrian Perrig, David B. Johnson
    Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2003, pp:- [Conf]
  4. Helen J. Wang, Yih-Chun Hu, Chun Yuan, Zheng Zhang, Yi-Min Wang
    Friends Troubleshooting Network: Towards Privacy-Preserving, Automatic Troubleshooting. [Citation Graph (0, 0)][DBLP]
    IPTPS, 2004, pp:184-194 [Conf]
  5. Josh Broch, David A. Maltz, David B. Johnson, Yih-Chun Hu, Jorjeta G. Jetcheva
    A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. [Citation Graph (0, 0)][DBLP]
    MOBICOM, 1998, pp:85-97 [Conf]
  6. Yih-Chun Hu, David B. Johnson
    Caching strategies in on-demand routing protocols for wireless ad hoc networks. [Citation Graph (0, 0)][DBLP]
    MOBICOM, 2000, pp:231-242 [Conf]
  7. Yih-Chun Hu, Adrian Perrig, David B. Johnson
    Ariadne: a secure on-demand routing protocol for ad hoc networks. [Citation Graph (0, 0)][DBLP]
    MOBICOM, 2002, pp:12-23 [Conf]
  8. Yih-Chun Hu, David B. Johnson
    Implicit source routes for on-demand ad hoc network routing. [Citation Graph (0, 0)][DBLP]
    MobiHoc, 2001, pp:1-10 [Conf]
  9. Yih-Chun Hu, Adrian Perrig, David B. Johnson
    Efficient Security Mechanisms for Routing Protocolsa. [Citation Graph (0, 0)][DBLP]
    NDSS, 2003, pp:- [Conf]
  10. Yih-Chun Hu, David B. Johnson
    Ensuring cache freshness in on-demand ad hoc network routing protocols. [Citation Graph (0, 0)][DBLP]
    POMC, 2002, pp:25-30 [Conf]
  11. Yih-Chun Hu, David B. Johnson
    Securing quality-of-service route discovery in on-demand routing for ad hoc networks. [Citation Graph (0, 0)][DBLP]
    SASN, 2004, pp:106-117 [Conf]
  12. Yih-Chun Hu, Adrian Perrig, Marvin A. Sirbu
    SPV: secure path vector routing for securing BGP. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 2004, pp:179-192 [Conf]
  13. Yih-Chun Hu, David B. Johnson, Adrian Perrig
    SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    WMCSA, 2002, pp:3-13 [Conf]
  14. Jorjeta G. Jetcheva, Yih-Chun Hu, Santashil PalChaudhuri, Amit Kumar Saha, David B. Johnson
    Design and Evaluation of a Metropolitan Area Multitier Wireless Ad Hoc Network Architecture. [Citation Graph (0, 0)][DBLP]
    WMCSA, 2003, pp:32-43 [Conf]
  15. Yih-Chun Hu, Adrian Perrig, David B. Johnson
    Rushing attacks and defense in wireless ad hoc network routing protocols. [Citation Graph (0, 0)][DBLP]
    Workshop on Wireless Security, 2003, pp:30-40 [Conf]
  16. Yih-Chun Hu, David B. Johnson, Adrian Perrig
    SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks. [Citation Graph (0, 0)][DBLP]
    Ad Hoc Networks, 2003, v:1, n:1, pp:175-192 [Journal]
  17. Yih-Chun Hu, Adrian Perrig
    A Survey of Secure Wireless Ad Hoc Routing. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:3, pp:28-39 [Journal]
  18. Yih-Chun Hu, Adrian Perrig, David B. Johnson
    Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    Wireless Networks, 2005, v:11, n:1-2, pp:21-38 [Journal]
  19. Tao Jiang, Helen J. Wang, Yih-Chun Hu
    Preserving location privacy in wireless lans. [Citation Graph (0, 0)][DBLP]
    MobiSys, 2007, pp:246-257 [Conf]
  20. Bryan Parno, Dan Wendlandt, Elaine Shi, Adrian Perrig, Bruce M. Maggs, Yih-Chun Hu
    Portcullis: protecting connection setup from denial-of-capability attacks. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 2007, pp:289-300 [Conf]

  21. SEAR: a secure efficient ad hoc on demand routing protocol for wireless networks. [Citation Graph (, )][DBLP]


  22. Dynamic Jamming Mitigation for Wireless Broadcast Networks. [Citation Graph (, )][DBLP]


  23. Fundamental Limits on Secure Clock Synchronization and Man-In-The-Middle Detection in Fixed Wireless Networks. [Citation Graph (, )][DBLP]


  24. Cross-layer jamming detection and mitigation in wireless broadcast networks. [Citation Graph (, )][DBLP]


  25. Security certificate revocation list distribution for vanet. [Citation Graph (, )][DBLP]


  26. Malicious or Selfish? Analysis of Carrier Sense Misbehavior in IEEE 802.11 WLAN. [Citation Graph (, )][DBLP]


  27. Real-World VANET Security Protocol Performance. [Citation Graph (, )][DBLP]


  28. Secure Unified Cellular Ad Hoc Network Routing. [Citation Graph (, )][DBLP]


  29. Secure and precise location verification using distance bounding and simultaneous multilateration. [Citation Graph (, )][DBLP]


  30. Optimal physical carrier sense in wireless networks. [Citation Graph (, )][DBLP]


Search in 0.005secs, Finished in 0.006secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002