|
Search the dblp DataBase
Ronghua Wang:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Wenliang Du, Ronghua Wang, Peng Ning
An efficient scheme for authenticating public keys in sensor networks. [Citation Graph (0, 0)][DBLP] MobiHoc, 2005, pp:58-67 [Conf]
- Wenliang Du, Zhouxuan Teng, Ronghua Wang
SEED: a suite of instructional laboratories for computer SEcurity EDucation. [Citation Graph (0, 0)][DBLP] SIGCSE, 2007, pp:486-490 [Conf]
- Guangming Xing, Jinhua Guo, Ronghua Wang
Managing XML Documents Using RDBMS. [Citation Graph (0, 0)][DBLP] SNPD, 2005, pp:186-191 [Conf]
Containing denial-of-service attacks in broadcast authentication in sensor networks. [Citation Graph (, )][DBLP]
Search in 0.001secs, Finished in 0.001secs
|