|
Search the dblp DataBase
Song Han:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Song Han, Tharam S. Dillon, Elizabeth Chang, Jie Wang
Improvement of a Convertible Undeniable Partially Blind Signature Scheme. [Citation Graph (0, 0)][DBLP] AINA (1), 2006, pp:875-882 [Conf]
- YueQuan Chen, Edward Chan, Song Han
Energy Efficient Multipath Routing in Large Scale Sensor Networks with Multiple Sink Nodes. [Citation Graph (0, 0)][DBLP] APPT, 2005, pp:390-399 [Conf]
- Song Han, Edward Chan
Probabilistic Continuous Update Scheme in Location Dependent Continuous Queries. [Citation Graph (0, 0)][DBLP] APPT, 2005, pp:494-504 [Conf]
- Geoff Skinner, Song Han, Elizabeth Chang
A New Conceptual Framework Within Information Privacy: Meta Privacy. [Citation Graph (0, 0)][DBLP] CIS (2), 2005, pp:55-61 [Conf]
- Song Han, Jie Wang, Wanquan Liu
An Efficient Identity-Based Group Signature Scheme over Elliptic Curves. [Citation Graph (0, 0)][DBLP] ECUMN, 2004, pp:417-429 [Conf]
- Geoff Skinner, Song Han, Elizabeth Chang
Defining and Protecting Meta Privacy: A New Conceptual Framework Within Information Privacy. [Citation Graph (0, 0)][DBLP] ICDE Workshops, 2006, pp:101- [Conf]
- Geoff Skinner, Song Han, Elizabeth Chang
A Framework of Privacy Shield in Organizational Information Systems. [Citation Graph (0, 0)][DBLP] ICMB, 2005, pp:647-650 [Conf]
- Winson K. Y. Yeung, Song Han
Revocable Anonymity of Undeniable Signature Scheme. [Citation Graph (0, 0)][DBLP] IDEAL, 2003, pp:76-83 [Conf]
- Song Han, Elizabeth Chang, Xiaotie Deng, Winson K. Y. Yeung, Li Gao
Practical Fair Anonymous Undeniable Signatures. [Citation Graph (0, 0)][DBLP] International Conference on Computational Intelligence, 2004, pp:510-515 [Conf]
- Song Han, Guochang Gu
The Architecture and Interlayer Adaptation of Ad Hoc & Sensor Networks. [Citation Graph (0, 0)][DBLP] IMSCCS (2), 2006, pp:649-653 [Conf]
- Song Han, Edward Chan
Continuous Residual Energy Monitoring in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP] ISPA, 2004, pp:169-177 [Conf]
- Prabuddha Biswas, Song Han, Jing Wu
Location Caching in the Mobile Middleware Platform. [Citation Graph (0, 0)][DBLP] Mobile Data Management, 2002, pp:172-174 [Conf]
- Song Han, Gérard G. Medioni
3DSketch: Modeling by Digitizing with a Smart 3D Pen. [Citation Graph (0, 0)][DBLP] ACM Multimedia, 1997, pp:41-49 [Conf]
- Song Han, Edward Chan, Reynold Cheng, Kam-yiu Lam
A Statistics-Based Sensor Selection Scheme for Continuous Probabilistic Queries in Sensor Networks. [Citation Graph (0, 0)][DBLP] RTCSA, 2005, pp:331-336 [Conf]
- Ming Xiong, Song Han, Deji Chen
Deferrable Scheduling for Temporal Consistency: Schedulability Analysis and Overhead Reduction. [Citation Graph (0, 0)][DBLP] RTCSA, 2006, pp:117-124 [Conf]
- Ming Xiong, Song Han, Kam-yiu Lam
A Deferrable Scheduling Algorithm for Real-Time Transactions Maintaining Data Freshness. [Citation Graph (0, 0)][DBLP] RTSS, 2005, pp:27-37 [Conf]
- Song Han, Elizabeth Chang, Tharam S. Dillon
Secure Electronic Commerce with Mobile Agents. [Citation Graph (0, 0)][DBLP] SEKE, 2005, pp:777-782 [Conf]
- Song Han, Winson K. Y. Yeung, Jie Wang
Identity-based confirmer signatures from pairings over elliptic curves. [Citation Graph (0, 0)][DBLP] ACM Conference on Electronic Commerce, 2003, pp:262-263 [Conf]
- Song Han, Gérard G. Medioni
Triangular NURBS Surface Modeling of Scattered Data. [Citation Graph (0, 0)][DBLP] IEEE Visualization, 1996, pp:295-302 [Conf]
- Senthil Kumar, Song Han, Dmitry B. Goldgof, Kevin W. Bowyer
On Recovering Hyperquadrics from Range Data. [Citation Graph (0, 0)][DBLP] IEEE Trans. Pattern Anal. Mach. Intell., 1995, v:17, n:11, pp:1079-1083 [Journal]
- Song Han, Edward Chan, Reynold Cheng, Kam-yiu Lam
A statistics-based sensor selection scheme for continuous probabilistic queries in sensor networks. [Citation Graph (0, 0)][DBLP] Real-Time Systems, 2007, v:35, n:1, pp:33-58 [Journal]
- Vidyasagar Potdar, Song Han, Elizabeth Chang, Chen Wu
Subjective and Objective Watermark Detection Using a Novel Approach - Barcode Watermarking. [Citation Graph (0, 0)][DBLP] CIS, 2006, pp:576-586 [Conf]
- Song Han, Vidyasagar Potdar, Elizabeth Chang
Mutual Authentication Protocol for RFID Tags Based on Synchronized Secret Information with Monitor. [Citation Graph (0, 0)][DBLP] ICCSA (3), 2007, pp:227-238 [Conf]
A Secure Key Management Model for Wireless Mesh Networks. [Citation Graph (, )][DBLP]
Towards Trust Establishment for Spectrum Selection in Cognitive Radio Networks. [Citation Graph (, )][DBLP]
Hallucinating 3D facial shapes. [Citation Graph (, )][DBLP]
Query-biased Near Duplicate Web Document Detecting: Effective, Efficient and Customizable. [Citation Graph (, )][DBLP]
A Schedulability Analysis of Deferrable Scheduling Using Patterns. [Citation Graph (, )][DBLP]
A Self-Healing and Mutual-Healing Key Distribution Scheme Using Bilinear Pairings for Wireless Networks. [Citation Graph (, )][DBLP]
Large Scale Analysis of Chinese Mobile Query Behavior. [Citation Graph (, )][DBLP]
A Mobile Ad Hoc Network with Mobile Satellite Earth-stations. [Citation Graph (, )][DBLP]
Anonymous Mutual Authentication Protocol for RFID Tag Without Back-End Database. [Citation Graph (, )][DBLP]
A Key Management Scheme for Heterogeneous Sensor Networks Using Keyed-Hash Chain. [Citation Graph (, )][DBLP]
Cross-Channel Query Recommendation on Commercial Mobile Search Engine: Why, How and Empirical Evaluation. [Citation Graph (, )][DBLP]
WirelessHART: Applying Wireless Technology in Real-Time Industrial Process Control. [Citation Graph (, )][DBLP]
Wi-HTest: Compliance Test Suite for Diagnosing Devices in Real-Time WirelessHART Network. [Citation Graph (, )][DBLP]
Design of a Reliable Communication System for Grid-Style Traffic Light Networks. [Citation Graph (, )][DBLP]
A Location-Determination Application in WirelessHART. [Citation Graph (, )][DBLP]
Online Scheduling Switch for Maintaining Data Freshness in Flexible Real-Time Systems. [Citation Graph (, )][DBLP]
WI-HTest: testing suite for diagnosing wirelesshart devices and networks. [Citation Graph (, )][DBLP]
A complete wirelessHART network. [Citation Graph (, )][DBLP]
Query Recommendation and Its Usefulness Evaluation on Mobile Search Engine. [Citation Graph (, )][DBLP]
Simple but Effective Porn Query Recognition by k-NN with Semantic Similarity Measure. [Citation Graph (, )][DBLP]
A self-healing key distribution scheme based on vector space secret sharing and one way hash chains. [Citation Graph (, )][DBLP]
A framework of authentication and authorization for e-health services. [Citation Graph (, )][DBLP]
Security against DOS attack in mobile IP communication. [Citation Graph (, )][DBLP]
An Efficient Self-Healing Key Distribution Scheme. [Citation Graph (, )][DBLP]
An Efficient Mobile Voting System Security Scheme Based on Elliptic Curve Cryptography. [Citation Graph (, )][DBLP]
A Survey of RFID Authentication Protocols Based on Hash-Chain Method [Citation Graph (, )][DBLP]
Search in 0.003secs, Finished in 0.645secs
|