The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Jeong Hyun Yi: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
    Identity-Based Access Control for Ad Hoc Groups. [Citation Graph (0, 0)][DBLP]
    ICISC, 2004, pp:362-379 [Conf]
  2. Maithili Narasimha, Gene Tsudik, Jeong Hyun Yi
    On the Utility of Distributed Cryptography in P2P and MANETs: The Case of Membership Control. [Citation Graph (0, 0)][DBLP]
    ICNP, 2003, pp:336-0 [Conf]
  3. Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
    Efficient Node Admission for Short-lived Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ICNP, 2005, pp:269-278 [Conf]
  4. Claude Castelluccia, Nitesh Saxena, Jeong Hyun Yi
    Self-configurable Key Pre-distribution in Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    NETWORKING, 2005, pp:1083-1095 [Conf]
  5. Stanislaw Jarecki, Nitesh Saxena, Jeong Hyun Yi
    An attack on the proactive RSA signature scheme in the URSA ad hoc network access control protocol. [Citation Graph (0, 0)][DBLP]
    SASN, 2004, pp:1-9 [Conf]
  6. Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
    Admission control in Peer-to-Peer: design and performance evaluation. [Citation Graph (0, 0)][DBLP]
    SASN, 2003, pp:104-113 [Conf]
  7. Jung Hee Cheon, Jeong Hyun Yi
    Fast Batch Verification of Multiple Signatures. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2007, pp:442-457 [Conf]
  8. Jeong Hyun Yi
    Energy-Efficient and Non-interactive Self-certification in MANETs. [Citation Graph (0, 0)][DBLP]
    SSS, 2006, pp:533-547 [Conf]
  9. Claude Castelluccia, Nitesh Saxena, Jeong Hyun Yi
    Robust self-keying mobile ad hoc networks. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:4, pp:1169-1182 [Journal]
  10. Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
    Threshold cryptography in P2P and MANETs: The case of access control. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:12, pp:3632-3649 [Journal]

  11. Self-Configurable Authentication Mechanism with Verifiability in Wireless Ad Hoc Networks. [Citation Graph (, )][DBLP]


Search in 0.001secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002