The SCEAS System
Navigation Menu

Search the dblp DataBase


Kui Ren: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Gang Yao, Kui Ren, Feng Bao, Robert H. Deng, Dengguo Feng
    Making the Key Agreement Protocol in Mobile ad hoc Network More Efficient. [Citation Graph (0, 0)][DBLP]
    ACNS, 2003, pp:343-356 [Conf]
  2. Kui Ren, Wenjing Lou
    Privacy enhanced access control in pervasive computing environments. [Citation Graph (0, 0)][DBLP]
    BROADNETS, 2005, pp:384-396 [Conf]
  3. Kui Ren, Hyunrok Lee, Kwangjo Kim, Taewhan Yoo
    Efficient Authenticated Key Agreement Protocol for Dynamic Groups. [Citation Graph (0, 0)][DBLP]
    WISA, 2004, pp:144-159 [Conf]
  4. Kui Ren, Kai Zeng, Wenjing Lou, Patrick J. Moran
    On Broadcast Authentication in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    WASA, 2006, pp:502-514 [Conf]
  5. Kui Ren, Tieyan Li, Zhiguo Wan, Feng Bao, Robert H. Deng, Kwangjo Kim
    Highly reliable trust establishment scheme in ad hoc networks. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2004, v:45, n:6, pp:687-699 [Journal]
  6. Kui Ren, Wenjing Lou, Kai Zeng, Feng Bao, Jianying Zhou, Robert H. Deng
    Routing optimization security in mobile IPv6. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2006, v:50, n:13, pp:2401-2419 [Journal]
  7. Kui Ren, Wenjing Lou
    Privacy-enhanced, Attack-resilient Access Control in Pervasive Computing Environments with Optional Context Authentication Capability. [Citation Graph (0, 0)][DBLP]
    MONET, 2007, v:12, n:1, pp:79-92 [Journal]
  8. Kui Ren, Kai Zeng, Wenjing Lou
    A new approach for random key pre-distribution in large-scale wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    , 2006, v:, n:, pp:307-318 [Journal]
  9. Kui Ren, Guillaume Bal, Andreas H. Hielscher
    Frequency Domain Optical Tomography Based on the Equation of Radiative Transfer. [Citation Graph (0, 0)][DBLP]
    SIAM J. Scientific Computing, 2006, v:28, n:4, pp:1463-1489 [Journal]
  10. Kui Ren, Wenjing Lou, Yanchao Zhang
    LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2006, pp:- [Conf]
  11. Kui Ren, Kai Zeng, Wenjing Lou
    Fault-tolerant Event Boundary Detection in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    GLOBECOM, 2006, pp:- [Conf]

  12. Anonymous user communication for privacy protection in wireless metropolitan mesh networks. [Citation Graph (, )][DBLP]

  13. Attribute based data sharing with attribute revocation. [Citation Graph (, )][DBLP]

  14. Attribute-based signature and its applications. [Citation Graph (, )][DBLP]

  15. Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing. [Citation Graph (, )][DBLP]

  16. Time-Slotted Round-Trip Carrier Synchronization in Large-Scale Wireless Networks. [Citation Graph (, )][DBLP]

  17. Multicast with an Application-Oriented Networking (AON) Approach. [Citation Graph (, )][DBLP]

  18. A Sophisticated Privacy-Enhanced Yet Accountable Security Framework for Metropolitan Wireless Mesh Networks. [Citation Graph (, )][DBLP]

  19. Secure Ranked Keyword Search over Encrypted Cloud Data. [Citation Graph (, )][DBLP]

  20. Optimized User Revocation for Group Signature Based Privacy-Aware PKI. [Citation Graph (, )][DBLP]

  21. Anonymous Misbehavior Detection in Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]

  22. Dependable and Secure Sensor Data Storage with Dynamic Integrity Assurance. [Citation Graph (, )][DBLP]

  23. DP2AC: Distributed Privacy-Preserving Access Control in Sensor Networks. [Citation Graph (, )][DBLP]

  24. FDAC: Toward Fine-Grained Distributed Data Access Control in Wireless Sensor Networks. [Citation Graph (, )][DBLP]

  25. Group Device Pairing based Secure Sensor Association and Key Management for Body Area Networks. [Citation Graph (, )][DBLP]

  26. Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing. [Citation Graph (, )][DBLP]

  27. Fuzzy Keyword Search over Encrypted Data in Cloud Computing. [Citation Graph (, )][DBLP]

  28. Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing. [Citation Graph (, )][DBLP]

  29. Privacy-Aware Attribute-Based Encryption with User Accountability. [Citation Graph (, )][DBLP]

  30. Opportunistic Cooperation with Receiver-Based Ratio Combining Strategy. [Citation Graph (, )][DBLP]

  31. Towards Secure Link Quality Measurement in Multihop Wireless Networks. [Citation Graph (, )][DBLP]

  32. Distributed Key Management with Protection Against RSU Compromise in Group Signature Based VANETs. [Citation Graph (, )][DBLP]

  33. A secure privacy-preserving roaming protocol based on hierarchical identity-based encryption for mobile networks. [Citation Graph (, )][DBLP]

  34. Multi-user Broadcast Authentication in Wireless Sensor Networks. [Citation Graph (, )][DBLP]

  35. Anonymous ID-Based Group Key Agreement for Wireless Networks. [Citation Graph (, )][DBLP]

  36. A New Approach to Malware Detection. [Citation Graph (, )][DBLP]

  37. Attribute-based on-demand multicast group setup with membership anonymity. [Citation Graph (, )][DBLP]

Search in 0.019secs, Finished in 0.020secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002