Search the dblp DataBase
Yih-Chun Hu :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Yih-Chun Hu , Markus Jakobsson , Adrian Perrig Efficient Constructions for One-Way Hash Chains. [Citation Graph (0, 0)][DBLP ] ACNS, 2005, pp:423-441 [Conf ] Yih-Chun Hu , David B. Johnson Exploiting Congestion Information in Network and Higher Layer Protocols in Multihop Wireless Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] ICDCS, 2004, pp:301-310 [Conf ] Yih-Chun Hu , Adrian Perrig , David B. Johnson Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks. [Citation Graph (0, 0)][DBLP ] INFOCOM, 2003, pp:- [Conf ] Helen J. Wang , Yih-Chun Hu , Chun Yuan , Zheng Zhang , Yi-Min Wang Friends Troubleshooting Network: Towards Privacy-Preserving, Automatic Troubleshooting. [Citation Graph (0, 0)][DBLP ] IPTPS, 2004, pp:184-194 [Conf ] Josh Broch , David A. Maltz , David B. Johnson , Yih-Chun Hu , Jorjeta G. Jetcheva A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. [Citation Graph (0, 0)][DBLP ] MOBICOM, 1998, pp:85-97 [Conf ] Yih-Chun Hu , David B. Johnson Caching strategies in on-demand routing protocols for wireless ad hoc networks. [Citation Graph (0, 0)][DBLP ] MOBICOM, 2000, pp:231-242 [Conf ] Yih-Chun Hu , Adrian Perrig , David B. Johnson Ariadne: a secure on-demand routing protocol for ad hoc networks. [Citation Graph (0, 0)][DBLP ] MOBICOM, 2002, pp:12-23 [Conf ] Yih-Chun Hu , David B. Johnson Implicit source routes for on-demand ad hoc network routing. [Citation Graph (0, 0)][DBLP ] MobiHoc, 2001, pp:1-10 [Conf ] Yih-Chun Hu , Adrian Perrig , David B. Johnson Efficient Security Mechanisms for Routing Protocolsa. [Citation Graph (0, 0)][DBLP ] NDSS, 2003, pp:- [Conf ] Yih-Chun Hu , David B. Johnson Ensuring cache freshness in on-demand ad hoc network routing protocols. [Citation Graph (0, 0)][DBLP ] POMC, 2002, pp:25-30 [Conf ] Yih-Chun Hu , David B. Johnson Securing quality-of-service route discovery in on-demand routing for ad hoc networks. [Citation Graph (0, 0)][DBLP ] SASN, 2004, pp:106-117 [Conf ] Yih-Chun Hu , Adrian Perrig , Marvin A. Sirbu SPV: secure path vector routing for securing BGP. [Citation Graph (0, 0)][DBLP ] SIGCOMM, 2004, pp:179-192 [Conf ] Yih-Chun Hu , David B. Johnson , Adrian Perrig SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] WMCSA, 2002, pp:3-13 [Conf ] Jorjeta G. Jetcheva , Yih-Chun Hu , Santashil PalChaudhuri , Amit Kumar Saha , David B. Johnson Design and Evaluation of a Metropolitan Area Multitier Wireless Ad Hoc Network Architecture. [Citation Graph (0, 0)][DBLP ] WMCSA, 2003, pp:32-43 [Conf ] Yih-Chun Hu , Adrian Perrig , David B. Johnson Rushing attacks and defense in wireless ad hoc network routing protocols. [Citation Graph (0, 0)][DBLP ] Workshop on Wireless Security, 2003, pp:30-40 [Conf ] Yih-Chun Hu , David B. Johnson , Adrian Perrig SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks. [Citation Graph (0, 0)][DBLP ] Ad Hoc Networks, 2003, v:1, n:1, pp:175-192 [Journal ] Yih-Chun Hu , Adrian Perrig A Survey of Secure Wireless Ad Hoc Routing. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2004, v:2, n:3, pp:28-39 [Journal ] Yih-Chun Hu , Adrian Perrig , David B. Johnson Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] Wireless Networks, 2005, v:11, n:1-2, pp:21-38 [Journal ] Tao Jiang , Helen J. Wang , Yih-Chun Hu Preserving location privacy in wireless lans. [Citation Graph (0, 0)][DBLP ] MobiSys, 2007, pp:246-257 [Conf ] Bryan Parno , Dan Wendlandt , Elaine Shi , Adrian Perrig , Bruce M. Maggs , Yih-Chun Hu Portcullis: protecting connection setup from denial-of-capability attacks. [Citation Graph (0, 0)][DBLP ] SIGCOMM, 2007, pp:289-300 [Conf ] SEAR: a secure efficient ad hoc on demand routing protocol for wireless networks. [Citation Graph (, )][DBLP ] Dynamic Jamming Mitigation for Wireless Broadcast Networks. [Citation Graph (, )][DBLP ] Fundamental Limits on Secure Clock Synchronization and Man-In-The-Middle Detection in Fixed Wireless Networks. [Citation Graph (, )][DBLP ] Cross-layer jamming detection and mitigation in wireless broadcast networks. [Citation Graph (, )][DBLP ] Security certificate revocation list distribution for vanet. [Citation Graph (, )][DBLP ] Malicious or Selfish? Analysis of Carrier Sense Misbehavior in IEEE 802.11 WLAN. [Citation Graph (, )][DBLP ] Real-World VANET Security Protocol Performance. [Citation Graph (, )][DBLP ] Secure Unified Cellular Ad Hoc Network Routing. [Citation Graph (, )][DBLP ] Secure and precise location verification using distance bounding and simultaneous multilateration. [Citation Graph (, )][DBLP ] Optimal physical carrier sense in wireless networks. [Citation Graph (, )][DBLP ] Search in 0.005secs, Finished in 0.006secs