The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Song Han: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Song Han, Tharam S. Dillon, Elizabeth Chang, Jie Wang
    Improvement of a Convertible Undeniable Partially Blind Signature Scheme. [Citation Graph (0, 0)][DBLP]
    AINA (1), 2006, pp:875-882 [Conf]
  2. YueQuan Chen, Edward Chan, Song Han
    Energy Efficient Multipath Routing in Large Scale Sensor Networks with Multiple Sink Nodes. [Citation Graph (0, 0)][DBLP]
    APPT, 2005, pp:390-399 [Conf]
  3. Song Han, Edward Chan
    Probabilistic Continuous Update Scheme in Location Dependent Continuous Queries. [Citation Graph (0, 0)][DBLP]
    APPT, 2005, pp:494-504 [Conf]
  4. Geoff Skinner, Song Han, Elizabeth Chang
    A New Conceptual Framework Within Information Privacy: Meta Privacy. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:55-61 [Conf]
  5. Song Han, Jie Wang, Wanquan Liu
    An Efficient Identity-Based Group Signature Scheme over Elliptic Curves. [Citation Graph (0, 0)][DBLP]
    ECUMN, 2004, pp:417-429 [Conf]
  6. Geoff Skinner, Song Han, Elizabeth Chang
    Defining and Protecting Meta Privacy: A New Conceptual Framework Within Information Privacy. [Citation Graph (0, 0)][DBLP]
    ICDE Workshops, 2006, pp:101- [Conf]
  7. Geoff Skinner, Song Han, Elizabeth Chang
    A Framework of Privacy Shield in Organizational Information Systems. [Citation Graph (0, 0)][DBLP]
    ICMB, 2005, pp:647-650 [Conf]
  8. Winson K. Y. Yeung, Song Han
    Revocable Anonymity of Undeniable Signature Scheme. [Citation Graph (0, 0)][DBLP]
    IDEAL, 2003, pp:76-83 [Conf]
  9. Song Han, Elizabeth Chang, Xiaotie Deng, Winson K. Y. Yeung, Li Gao
    Practical Fair Anonymous Undeniable Signatures. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Intelligence, 2004, pp:510-515 [Conf]
  10. Song Han, Guochang Gu
    The Architecture and Interlayer Adaptation of Ad Hoc & Sensor Networks. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:649-653 [Conf]
  11. Song Han, Edward Chan
    Continuous Residual Energy Monitoring in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ISPA, 2004, pp:169-177 [Conf]
  12. Prabuddha Biswas, Song Han, Jing Wu
    Location Caching in the Mobile Middleware Platform. [Citation Graph (0, 0)][DBLP]
    Mobile Data Management, 2002, pp:172-174 [Conf]
  13. Song Han, Gérard G. Medioni
    3DSketch: Modeling by Digitizing with a Smart 3D Pen. [Citation Graph (0, 0)][DBLP]
    ACM Multimedia, 1997, pp:41-49 [Conf]
  14. Song Han, Edward Chan, Reynold Cheng, Kam-yiu Lam
    A Statistics-Based Sensor Selection Scheme for Continuous Probabilistic Queries in Sensor Networks. [Citation Graph (0, 0)][DBLP]
    RTCSA, 2005, pp:331-336 [Conf]
  15. Ming Xiong, Song Han, Deji Chen
    Deferrable Scheduling for Temporal Consistency: Schedulability Analysis and Overhead Reduction. [Citation Graph (0, 0)][DBLP]
    RTCSA, 2006, pp:117-124 [Conf]
  16. Ming Xiong, Song Han, Kam-yiu Lam
    A Deferrable Scheduling Algorithm for Real-Time Transactions Maintaining Data Freshness. [Citation Graph (0, 0)][DBLP]
    RTSS, 2005, pp:27-37 [Conf]
  17. Song Han, Elizabeth Chang, Tharam S. Dillon
    Secure Electronic Commerce with Mobile Agents. [Citation Graph (0, 0)][DBLP]
    SEKE, 2005, pp:777-782 [Conf]
  18. Song Han, Winson K. Y. Yeung, Jie Wang
    Identity-based confirmer signatures from pairings over elliptic curves. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Electronic Commerce, 2003, pp:262-263 [Conf]
  19. Song Han, Gérard G. Medioni
    Triangular NURBS Surface Modeling of Scattered Data. [Citation Graph (0, 0)][DBLP]
    IEEE Visualization, 1996, pp:295-302 [Conf]
  20. Senthil Kumar, Song Han, Dmitry B. Goldgof, Kevin W. Bowyer
    On Recovering Hyperquadrics from Range Data. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Pattern Anal. Mach. Intell., 1995, v:17, n:11, pp:1079-1083 [Journal]
  21. Song Han, Edward Chan, Reynold Cheng, Kam-yiu Lam
    A statistics-based sensor selection scheme for continuous probabilistic queries in sensor networks. [Citation Graph (0, 0)][DBLP]
    Real-Time Systems, 2007, v:35, n:1, pp:33-58 [Journal]
  22. Vidyasagar Potdar, Song Han, Elizabeth Chang, Chen Wu
    Subjective and Objective Watermark Detection Using a Novel Approach - Barcode Watermarking. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:576-586 [Conf]
  23. Song Han, Vidyasagar Potdar, Elizabeth Chang
    Mutual Authentication Protocol for RFID Tags Based on Synchronized Secret Information with Monitor. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2007, pp:227-238 [Conf]

  24. A Secure Key Management Model for Wireless Mesh Networks. [Citation Graph (, )][DBLP]


  25. Towards Trust Establishment for Spectrum Selection in Cognitive Radio Networks. [Citation Graph (, )][DBLP]


  26. Hallucinating 3D facial shapes. [Citation Graph (, )][DBLP]


  27. Query-biased Near Duplicate Web Document Detecting: Effective, Efficient and Customizable. [Citation Graph (, )][DBLP]


  28. A Schedulability Analysis of Deferrable Scheduling Using Patterns. [Citation Graph (, )][DBLP]


  29. A Self-Healing and Mutual-Healing Key Distribution Scheme Using Bilinear Pairings for Wireless Networks. [Citation Graph (, )][DBLP]


  30. Large Scale Analysis of Chinese Mobile Query Behavior. [Citation Graph (, )][DBLP]


  31. A Mobile Ad Hoc Network with Mobile Satellite Earth-stations. [Citation Graph (, )][DBLP]


  32. Anonymous Mutual Authentication Protocol for RFID Tag Without Back-End Database. [Citation Graph (, )][DBLP]


  33. A Key Management Scheme for Heterogeneous Sensor Networks Using Keyed-Hash Chain. [Citation Graph (, )][DBLP]


  34. Cross-Channel Query Recommendation on Commercial Mobile Search Engine: Why, How and Empirical Evaluation. [Citation Graph (, )][DBLP]


  35. WirelessHART: Applying Wireless Technology in Real-Time Industrial Process Control. [Citation Graph (, )][DBLP]


  36. Wi-HTest: Compliance Test Suite for Diagnosing Devices in Real-Time WirelessHART Network. [Citation Graph (, )][DBLP]


  37. Design of a Reliable Communication System for Grid-Style Traffic Light Networks. [Citation Graph (, )][DBLP]


  38. A Location-Determination Application in WirelessHART. [Citation Graph (, )][DBLP]


  39. Online Scheduling Switch for Maintaining Data Freshness in Flexible Real-Time Systems. [Citation Graph (, )][DBLP]


  40. WI-HTest: testing suite for diagnosing wirelesshart devices and networks. [Citation Graph (, )][DBLP]


  41. A complete wirelessHART network. [Citation Graph (, )][DBLP]


  42. Query Recommendation and Its Usefulness Evaluation on Mobile Search Engine. [Citation Graph (, )][DBLP]


  43. Simple but Effective Porn Query Recognition by k-NN with Semantic Similarity Measure. [Citation Graph (, )][DBLP]


  44. A self-healing key distribution scheme based on vector space secret sharing and one way hash chains. [Citation Graph (, )][DBLP]


  45. A framework of authentication and authorization for e-health services. [Citation Graph (, )][DBLP]


  46. Security against DOS attack in mobile IP communication. [Citation Graph (, )][DBLP]


  47. An Efficient Self-Healing Key Distribution Scheme. [Citation Graph (, )][DBLP]


  48. An Efficient Mobile Voting System Security Scheme Based on Elliptic Curve Cryptography. [Citation Graph (, )][DBLP]


  49. A Survey of RFID Authentication Protocols Based on Hash-Chain Method [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.645secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002